Welcome to the new version of CaltechAUTHORS. Login is currently restricted to library staff. If you notice any issues, please email coda@library.caltech.edu
Published 2003 | public
Book Section - Chapter

Quantum algorithms for some hidden shift problems

Abstract

Almost all of the most successful quantum algorithms discovered to date exploit the ability of the Fourier transform to recover subgroup structure of functions, especially periodicity. The fact that Fourier transforms can also be used to capture shift structure has received fax less attention in the context of quantum computation. In this paper, we present three examples of "unknown shift" problems that can be solved efficiently on a quantum computer using the quantum Fourier transform. We also define the hidden coset problem, which generalizes the hidden shift problem and the hidden subgroup problem. This framework provides a unified way of viewing the ability of the Fourier transform to capture subgroup and shift structure.

Additional Information

© 2003 Association for Computing Machinery. Supported by an HP-MSRI postdoc fellowship. Supported in part by an NSF Mathematical Sciences Postdoctoral Fellowship and in part by the NSF though the Institute for Quantum Information at the California Institute of Technology. Most of this work done while the author was at the Mathematical Sciences Research Institute and the University of California, Berkeley, with partial support from DARPA QUIST Grant F30602-01-2-0524. Supported by NSF Grant CCR-0049092, DARPA Grant F306-02-00-2-0601 and DARPA QUIST Grant F30602-01-2-2054. Part of this work was done while the author was a visitor at the Institute for Quantum Information at the California Institute of Technology. We would like to thank the anonymous referee who pointed out the application of shifted Legendre symbol problem to algebraically homomorphic cryptosystems and Umesh Vazirani, whose many suggestions greatly improved this paper. We also thank Dylan Thurston and an anonymous referee for pointing out that algebraically homomorphic cryptosystems can be broken using Shor's algorithm for discrete log. Thanks to Lisa Hales for helpful last minute suggestions.

Additional details

Created:
August 19, 2023
Modified:
January 13, 2024